@action-llama/action-llama 0.10.1 → 0.10.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/agents/execution-engine.d.ts.map +1 -1
- package/dist/agents/execution-engine.js +2 -15
- package/dist/agents/execution-engine.js.map +1 -1
- package/dist/agents/runner.d.ts.map +1 -1
- package/dist/agents/runner.js +2 -15
- package/dist/agents/runner.js.map +1 -1
- package/dist/cli/commands/cloud-iam.d.ts +17 -0
- package/dist/cli/commands/cloud-iam.d.ts.map +1 -0
- package/dist/cli/commands/cloud-iam.js +591 -0
- package/dist/cli/commands/cloud-iam.js.map +1 -0
- package/dist/cli/commands/cloud-setup-ecs.d.ts +9 -0
- package/dist/cli/commands/cloud-setup-ecs.d.ts.map +1 -0
- package/dist/cli/commands/cloud-setup-ecs.js +697 -0
- package/dist/cli/commands/cloud-setup-ecs.js.map +1 -0
- package/dist/cli/commands/cloud-setup.d.ts.map +1 -1
- package/dist/cli/commands/cloud-setup.js +2 -827
- package/dist/cli/commands/cloud-setup.js.map +1 -1
- package/dist/cli/commands/creds.d.ts.map +1 -1
- package/dist/cli/commands/creds.js +2 -4
- package/dist/cli/commands/creds.js.map +1 -1
- package/dist/cli/commands/doctor.d.ts +1 -3
- package/dist/cli/commands/doctor.d.ts.map +1 -1
- package/dist/cli/commands/doctor.js +60 -635
- package/dist/cli/commands/doctor.js.map +1 -1
- package/dist/cli/commands/kill.d.ts.map +1 -1
- package/dist/cli/commands/kill.js +11 -14
- package/dist/cli/commands/kill.js.map +1 -1
- package/dist/cli/commands/pause.d.ts.map +1 -1
- package/dist/cli/commands/pause.js +11 -14
- package/dist/cli/commands/pause.js.map +1 -1
- package/dist/cli/commands/resume.d.ts.map +1 -1
- package/dist/cli/commands/resume.js +11 -14
- package/dist/cli/commands/resume.js.map +1 -1
- package/dist/cli/main.js +34 -32
- package/dist/cli/main.js.map +1 -1
- package/dist/cli/with-command.d.ts +13 -0
- package/dist/cli/with-command.d.ts.map +1 -0
- package/dist/cli/with-command.js +45 -0
- package/dist/cli/with-command.js.map +1 -0
- package/dist/gateway/index.d.ts +1 -0
- package/dist/gateway/index.d.ts.map +1 -1
- package/dist/gateway/index.js +5 -2
- package/dist/gateway/index.js.map +1 -1
- package/dist/gateway/rate-limiter.d.ts +16 -0
- package/dist/gateway/rate-limiter.d.ts.map +1 -0
- package/dist/gateway/rate-limiter.js +38 -0
- package/dist/gateway/rate-limiter.js.map +1 -0
- package/dist/gateway/routes/dashboard.d.ts.map +1 -1
- package/dist/gateway/routes/dashboard.js +8 -0
- package/dist/gateway/routes/dashboard.js.map +1 -1
- package/dist/gateway/routes/locks.d.ts +3 -1
- package/dist/gateway/routes/locks.d.ts.map +1 -1
- package/dist/gateway/routes/locks.js +18 -13
- package/dist/gateway/routes/locks.js.map +1 -1
- package/dist/gateway/routes/webhooks.d.ts.map +1 -1
- package/dist/gateway/routes/webhooks.js +14 -0
- package/dist/gateway/routes/webhooks.js.map +1 -1
- package/dist/scheduler/index.d.ts +1 -2
- package/dist/scheduler/index.d.ts.map +1 -1
- package/dist/scheduler/index.js +22 -180
- package/dist/scheduler/index.js.map +1 -1
- package/dist/scheduler/runtime-factory.d.ts +24 -4
- package/dist/scheduler/runtime-factory.d.ts.map +1 -1
- package/dist/scheduler/runtime-factory.js +60 -64
- package/dist/scheduler/runtime-factory.js.map +1 -1
- package/dist/scheduler/webhook-setup.d.ts +11 -20
- package/dist/scheduler/webhook-setup.d.ts.map +1 -1
- package/dist/scheduler/webhook-setup.js +22 -68
- package/dist/scheduler/webhook-setup.js.map +1 -1
- package/dist/shared/config.d.ts +1 -0
- package/dist/shared/config.d.ts.map +1 -1
- package/dist/shared/config.js +13 -2
- package/dist/shared/config.js.map +1 -1
- package/dist/shared/credentials.d.ts.map +1 -1
- package/dist/shared/credentials.js +2 -1
- package/dist/shared/credentials.js.map +1 -1
- package/dist/shared/errors.d.ts +34 -0
- package/dist/shared/errors.d.ts.map +1 -0
- package/dist/shared/errors.js +47 -0
- package/dist/shared/errors.js.map +1 -0
- package/dist/shared/git.d.ts.map +1 -1
- package/dist/shared/git.js +3 -2
- package/dist/shared/git.js.map +1 -1
- package/dist/webhooks/providers/github.d.ts.map +1 -1
- package/dist/webhooks/providers/github.js +2 -21
- package/dist/webhooks/providers/github.js.map +1 -1
- package/dist/webhooks/providers/linear.d.ts.map +1 -1
- package/dist/webhooks/providers/linear.js +2 -21
- package/dist/webhooks/providers/linear.js.map +1 -1
- package/dist/webhooks/providers/sentry.d.ts.map +1 -1
- package/dist/webhooks/providers/sentry.js +2 -20
- package/dist/webhooks/providers/sentry.js.map +1 -1
- package/dist/webhooks/validation.d.ts +17 -0
- package/dist/webhooks/validation.d.ts.map +1 -0
- package/dist/webhooks/validation.js +37 -0
- package/dist/webhooks/validation.js.map +1 -0
- package/package.json +1 -1
- package/dist/scheduler/config-validator.d.ts +0 -18
- package/dist/scheduler/config-validator.d.ts.map +0 -1
- package/dist/scheduler/config-validator.js +0 -53
- package/dist/scheduler/config-validator.js.map +0 -1
- package/dist/scheduler/cron-manager.d.ts +0 -14
- package/dist/scheduler/cron-manager.d.ts.map +0 -1
- package/dist/scheduler/cron-manager.js +0 -75
- package/dist/scheduler/cron-manager.js.map +0 -1
- package/dist/scheduler/shutdown-handler.d.ts +0 -16
- package/dist/scheduler/shutdown-handler.d.ts.map +0 -1
- package/dist/scheduler/shutdown-handler.js +0 -44
- package/dist/scheduler/shutdown-handler.js.map +0 -1
- package/dist/scheduler/trigger-dispatcher.d.ts +0 -12
- package/dist/scheduler/trigger-dispatcher.d.ts.map +0 -1
- package/dist/scheduler/trigger-dispatcher.js +0 -46
- package/dist/scheduler/trigger-dispatcher.js.map +0 -1
|
@@ -0,0 +1,591 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Cloud IAM reconciliation for doctor and cloud-setup commands.
|
|
3
|
+
*
|
|
4
|
+
* Extracted from doctor.ts to keep the credential validation logic
|
|
5
|
+
* separate from cloud infrastructure provisioning.
|
|
6
|
+
*/
|
|
7
|
+
import { execFileSync } from "child_process";
|
|
8
|
+
import { confirm } from "@inquirer/prompts";
|
|
9
|
+
import { STSClient, GetCallerIdentityCommand } from "@aws-sdk/client-sts";
|
|
10
|
+
import { IAMClient, CreateRoleCommand, PutRolePolicyCommand, PutUserPolicyCommand, GetRoleCommand } from "@aws-sdk/client-iam";
|
|
11
|
+
import { ECRClient, SetRepositoryPolicyCommand } from "@aws-sdk/client-ecr";
|
|
12
|
+
import { discoverAgents, loadAgentConfig, loadGlobalConfig } from "../../shared/config.js";
|
|
13
|
+
import { parseCredentialRef } from "../../shared/credentials.js";
|
|
14
|
+
import { AWS_CONSTANTS } from "../../shared/aws-constants.js";
|
|
15
|
+
import { ConfigError, CloudProviderError } from "../../shared/errors.js";
|
|
16
|
+
export async function reconcileCloudIam(projectPath, cloud) {
|
|
17
|
+
if (cloud.provider === "cloud-run") {
|
|
18
|
+
await reconcileGcp(projectPath, cloud);
|
|
19
|
+
}
|
|
20
|
+
else if (cloud.provider === "ecs") {
|
|
21
|
+
await reconcileAws(projectPath, cloud);
|
|
22
|
+
}
|
|
23
|
+
else {
|
|
24
|
+
throw new CloudProviderError(`Unknown cloud provider: "${cloud.provider}"`);
|
|
25
|
+
}
|
|
26
|
+
}
|
|
27
|
+
async function reconcileGcp(projectPath, cloud) {
|
|
28
|
+
const { gcpProject, secretPrefix: configPrefix } = cloud;
|
|
29
|
+
if (!gcpProject) {
|
|
30
|
+
throw new ConfigError("cloud.gcpProject is required in config.toml");
|
|
31
|
+
}
|
|
32
|
+
const secretPrefix = configPrefix || AWS_CONSTANTS.DEFAULT_SECRET_PREFIX;
|
|
33
|
+
// Verify gcloud is available and authenticated
|
|
34
|
+
try {
|
|
35
|
+
gcloud(["auth", "print-access-token"], gcpProject);
|
|
36
|
+
}
|
|
37
|
+
catch (err) {
|
|
38
|
+
throw new CloudProviderError("gcloud CLI is not authenticated. Run 'gcloud auth login' first.\n" +
|
|
39
|
+
`Original error: ${err.message}`);
|
|
40
|
+
}
|
|
41
|
+
const agents = discoverAgents(projectPath);
|
|
42
|
+
if (agents.length === 0) {
|
|
43
|
+
console.log("No agents found. Create agents first.");
|
|
44
|
+
return;
|
|
45
|
+
}
|
|
46
|
+
// Pre-flight: check if any secrets exist in GSM with this prefix
|
|
47
|
+
const preflight = listGsmSecretCount(gcpProject, secretPrefix);
|
|
48
|
+
if (preflight === 0) {
|
|
49
|
+
console.log(`\nWarning: No secrets found in GSM with prefix "${secretPrefix}".\n` +
|
|
50
|
+
`IAM bindings are created against existing secrets, so you should push credentials first.\n`);
|
|
51
|
+
const proceed = await confirm({
|
|
52
|
+
message: "Continue anyway? (Service accounts will be created but no secrets will be bound)",
|
|
53
|
+
default: false,
|
|
54
|
+
});
|
|
55
|
+
if (!proceed) {
|
|
56
|
+
console.log("Aborted. Push credentials first, then re-run.");
|
|
57
|
+
return;
|
|
58
|
+
}
|
|
59
|
+
}
|
|
60
|
+
console.log(`\nSetting up Cloud Run service accounts for ${agents.length} agent(s)...\n`);
|
|
61
|
+
for (const name of agents) {
|
|
62
|
+
const config = loadAgentConfig(projectPath, name);
|
|
63
|
+
const saName = AWS_CONSTANTS.serviceAccountName(name);
|
|
64
|
+
const saEmail = AWS_CONSTANTS.serviceAccountEmail(name, gcpProject);
|
|
65
|
+
console.log(` Agent: ${name}`);
|
|
66
|
+
console.log(` SA: ${saEmail}`);
|
|
67
|
+
// 1. Create service account (idempotent)
|
|
68
|
+
try {
|
|
69
|
+
gcloud([
|
|
70
|
+
"iam", "service-accounts", "create", saName,
|
|
71
|
+
"--display-name", `Action Llama agent: ${name}`,
|
|
72
|
+
"--project", gcpProject,
|
|
73
|
+
], gcpProject);
|
|
74
|
+
console.log(` Created service account`);
|
|
75
|
+
}
|
|
76
|
+
catch (err) {
|
|
77
|
+
if (err.message?.includes("already exists")) {
|
|
78
|
+
console.log(` Service account already exists`);
|
|
79
|
+
}
|
|
80
|
+
else {
|
|
81
|
+
throw err;
|
|
82
|
+
}
|
|
83
|
+
}
|
|
84
|
+
// 2. Collect all secret names this agent needs
|
|
85
|
+
const credRefs = [...new Set(config.credentials)];
|
|
86
|
+
if (config.model.authType !== "pi_auth" && !credRefs.includes("anthropic_key:default")) {
|
|
87
|
+
credRefs.push("anthropic_key:default");
|
|
88
|
+
}
|
|
89
|
+
const secretNames = [];
|
|
90
|
+
for (const ref of credRefs) {
|
|
91
|
+
const { type, instance } = parseCredentialRef(ref);
|
|
92
|
+
const fields = listGsmFields(gcpProject, secretPrefix, type, instance);
|
|
93
|
+
for (const field of fields) {
|
|
94
|
+
secretNames.push(`${secretPrefix}--${type}--${instance}--${field}`);
|
|
95
|
+
}
|
|
96
|
+
}
|
|
97
|
+
// 3. Grant secretmanager.secretAccessor on each secret
|
|
98
|
+
let boundCount = 0;
|
|
99
|
+
for (const secretName of secretNames) {
|
|
100
|
+
try {
|
|
101
|
+
gcloud([
|
|
102
|
+
"secrets", "add-iam-policy-binding", secretName,
|
|
103
|
+
"--member", `serviceAccount:${saEmail}`,
|
|
104
|
+
"--role", "roles/secretmanager.secretAccessor",
|
|
105
|
+
"--project", gcpProject,
|
|
106
|
+
], gcpProject);
|
|
107
|
+
boundCount++;
|
|
108
|
+
}
|
|
109
|
+
catch (err) {
|
|
110
|
+
if (err.message?.includes("already exists") || err.message?.includes("already has")) {
|
|
111
|
+
boundCount++;
|
|
112
|
+
}
|
|
113
|
+
else {
|
|
114
|
+
console.log(` Warning: failed to bind ${secretName}: ${err.message}`);
|
|
115
|
+
}
|
|
116
|
+
}
|
|
117
|
+
}
|
|
118
|
+
console.log(` Bound ${boundCount} secret(s)`);
|
|
119
|
+
// 4. Grant the SA permission to act as itself (for Cloud Run job execution)
|
|
120
|
+
try {
|
|
121
|
+
gcloud([
|
|
122
|
+
"iam", "service-accounts", "add-iam-policy-binding", saEmail,
|
|
123
|
+
"--member", `serviceAccount:${saEmail}`,
|
|
124
|
+
"--role", "roles/iam.serviceAccountUser",
|
|
125
|
+
"--project", gcpProject,
|
|
126
|
+
], gcpProject);
|
|
127
|
+
}
|
|
128
|
+
catch {
|
|
129
|
+
// May already be bound
|
|
130
|
+
}
|
|
131
|
+
console.log("");
|
|
132
|
+
}
|
|
133
|
+
console.log("Done. Each agent now has an isolated service account with access to only its declared secrets.");
|
|
134
|
+
}
|
|
135
|
+
async function reconcileAws(projectPath, cloud) {
|
|
136
|
+
const { awsRegion, ecrRepository, awsSecretPrefix } = cloud;
|
|
137
|
+
if (!awsRegion) {
|
|
138
|
+
throw new ConfigError("cloud.awsRegion is required in config.toml");
|
|
139
|
+
}
|
|
140
|
+
if (!ecrRepository) {
|
|
141
|
+
throw new ConfigError("cloud.ecrRepository is required in config.toml");
|
|
142
|
+
}
|
|
143
|
+
const secretPrefix = awsSecretPrefix || AWS_CONSTANTS.DEFAULT_SECRET_PREFIX;
|
|
144
|
+
// Extract account ID from ECR repo URI
|
|
145
|
+
const accountMatch = ecrRepository.match(/^(\d+)\.dkr\.ecr\./);
|
|
146
|
+
if (!accountMatch) {
|
|
147
|
+
throw new ConfigError(`Cannot extract AWS account ID from cloud.ecrRepository: "${ecrRepository}". ` +
|
|
148
|
+
`Expected format: 123456789012.dkr.ecr.<region>.amazonaws.com/<repo>`);
|
|
149
|
+
}
|
|
150
|
+
const accountId = accountMatch[1];
|
|
151
|
+
// Verify AWS credentials are valid
|
|
152
|
+
const stsClient = new STSClient({ region: awsRegion });
|
|
153
|
+
try {
|
|
154
|
+
await stsClient.send(new GetCallerIdentityCommand({}));
|
|
155
|
+
}
|
|
156
|
+
catch (err) {
|
|
157
|
+
throw new CloudProviderError("AWS CLI is not authenticated. Run 'aws configure' or set AWS_ACCESS_KEY_ID/AWS_SECRET_ACCESS_KEY.\n" +
|
|
158
|
+
`Original error: ${err.message}`);
|
|
159
|
+
}
|
|
160
|
+
const agents = discoverAgents(projectPath);
|
|
161
|
+
if (agents.length === 0) {
|
|
162
|
+
console.log("No agents found. Create agents first.");
|
|
163
|
+
return;
|
|
164
|
+
}
|
|
165
|
+
// Trust policy for ECS tasks
|
|
166
|
+
const trustPolicy = JSON.stringify({
|
|
167
|
+
Version: "2012-10-17",
|
|
168
|
+
Statement: [{
|
|
169
|
+
Effect: "Allow",
|
|
170
|
+
Principal: { Service: "ecs-tasks.amazonaws.com" },
|
|
171
|
+
Action: "sts:AssumeRole",
|
|
172
|
+
}],
|
|
173
|
+
});
|
|
174
|
+
const iamClient = new IAMClient({ region: awsRegion });
|
|
175
|
+
// Ensure execution role has Secrets Manager access (ECS uses this role to inject secrets)
|
|
176
|
+
if (cloud.executionRoleArn) {
|
|
177
|
+
const executionRoleName = cloud.executionRoleArn.split("/").pop();
|
|
178
|
+
try {
|
|
179
|
+
await iamClient.send(new PutRolePolicyCommand({
|
|
180
|
+
RoleName: executionRoleName,
|
|
181
|
+
PolicyName: "ActionLlamaExecution",
|
|
182
|
+
PolicyDocument: JSON.stringify({
|
|
183
|
+
Version: "2012-10-17",
|
|
184
|
+
Statement: [
|
|
185
|
+
{
|
|
186
|
+
Effect: "Allow",
|
|
187
|
+
Action: "secretsmanager:GetSecretValue",
|
|
188
|
+
Resource: `arn:aws:secretsmanager:${awsRegion}:${accountId}:secret:${secretPrefix}/*`,
|
|
189
|
+
},
|
|
190
|
+
{
|
|
191
|
+
Effect: "Allow",
|
|
192
|
+
Action: "logs:CreateLogGroup",
|
|
193
|
+
Resource: `arn:aws:logs:${awsRegion}:${accountId}:log-group:${AWS_CONSTANTS.LOG_GROUP}*`,
|
|
194
|
+
},
|
|
195
|
+
],
|
|
196
|
+
}),
|
|
197
|
+
}));
|
|
198
|
+
console.log(`Execution role (${executionRoleName}): Secrets Manager + CloudWatch policy applied`);
|
|
199
|
+
}
|
|
200
|
+
catch (err) {
|
|
201
|
+
throw new CloudProviderError(`Failed to attach ActionLlamaExecution policy to ${executionRoleName}: ${err.message}\n` +
|
|
202
|
+
`The execution role needs secretsmanager:GetSecretValue and logs:CreateLogGroup permissions.\n` +
|
|
203
|
+
`Either grant your IAM user iam:PutRolePolicy on this role, or attach the policy manually in the AWS Console.`);
|
|
204
|
+
}
|
|
205
|
+
}
|
|
206
|
+
// Ensure ECR repository policy grants Lambda pull access
|
|
207
|
+
await ensureLambdaEcrPolicy(awsRegion, ecrRepository);
|
|
208
|
+
console.log(`\nSetting up ECS task roles for ${agents.length} agent(s)...\n`);
|
|
209
|
+
for (const name of agents) {
|
|
210
|
+
const config = loadAgentConfig(projectPath, name);
|
|
211
|
+
const roleName = AWS_CONSTANTS.taskRoleName(name);
|
|
212
|
+
console.log(` Agent: ${name}`);
|
|
213
|
+
console.log(` Role: ${roleName}`);
|
|
214
|
+
// 1. Create IAM role (idempotent)
|
|
215
|
+
try {
|
|
216
|
+
await iamClient.send(new CreateRoleCommand({
|
|
217
|
+
RoleName: roleName,
|
|
218
|
+
AssumeRolePolicyDocument: trustPolicy,
|
|
219
|
+
}));
|
|
220
|
+
console.log(` Created IAM role`);
|
|
221
|
+
}
|
|
222
|
+
catch (err) {
|
|
223
|
+
if (err.name === "EntityAlreadyExistsException") {
|
|
224
|
+
console.log(` IAM role already exists`);
|
|
225
|
+
}
|
|
226
|
+
else {
|
|
227
|
+
throw err;
|
|
228
|
+
}
|
|
229
|
+
}
|
|
230
|
+
// 2. Collect secret ARNs this agent needs
|
|
231
|
+
const credRefs = [...new Set(config.credentials)];
|
|
232
|
+
if (config.model.authType !== "pi_auth" && !credRefs.includes("anthropic_key:default")) {
|
|
233
|
+
credRefs.push("anthropic_key:default");
|
|
234
|
+
}
|
|
235
|
+
const secretArns = [];
|
|
236
|
+
for (const ref of credRefs) {
|
|
237
|
+
const { type, instance } = parseCredentialRef(ref);
|
|
238
|
+
secretArns.push(`arn:aws:secretsmanager:${awsRegion}:${accountId}:secret:${secretPrefix}/${type}/${instance}/*`);
|
|
239
|
+
}
|
|
240
|
+
// 3. Put inline policy for Secrets Manager access
|
|
241
|
+
if (secretArns.length > 0) {
|
|
242
|
+
const policy = JSON.stringify({
|
|
243
|
+
Version: "2012-10-17",
|
|
244
|
+
Statement: [{
|
|
245
|
+
Effect: "Allow",
|
|
246
|
+
Action: "secretsmanager:GetSecretValue",
|
|
247
|
+
Resource: secretArns,
|
|
248
|
+
}],
|
|
249
|
+
});
|
|
250
|
+
try {
|
|
251
|
+
await iamClient.send(new PutRolePolicyCommand({
|
|
252
|
+
RoleName: roleName,
|
|
253
|
+
PolicyName: "SecretsAccess",
|
|
254
|
+
PolicyDocument: policy,
|
|
255
|
+
}));
|
|
256
|
+
console.log(` Bound ${secretArns.length} secret path(s)`);
|
|
257
|
+
}
|
|
258
|
+
catch (err) {
|
|
259
|
+
console.log(` Warning: failed to put policy: ${err.message}`);
|
|
260
|
+
}
|
|
261
|
+
}
|
|
262
|
+
else {
|
|
263
|
+
console.log(` No secrets to bind`);
|
|
264
|
+
}
|
|
265
|
+
console.log("");
|
|
266
|
+
}
|
|
267
|
+
// Grant iam:PassRole on ECS task roles + execution role to the calling identity
|
|
268
|
+
const taskRoleArns = agents.map((name) => `arn:aws:iam::${accountId}:role/${AWS_CONSTANTS.taskRoleName(name)}`);
|
|
269
|
+
if (cloud.executionRoleArn) {
|
|
270
|
+
taskRoleArns.push(cloud.executionRoleArn);
|
|
271
|
+
}
|
|
272
|
+
if (taskRoleArns.length > 0) {
|
|
273
|
+
await grantPassRole(awsRegion, iamClient, taskRoleArns, "ActionLlamaEcsPassRole");
|
|
274
|
+
}
|
|
275
|
+
console.log("Done. Each agent now has an isolated IAM task role with access to only its declared secrets.");
|
|
276
|
+
console.log(`\nTask roles follow the convention: al-{agentName}-task-role`);
|
|
277
|
+
console.log("The ECS runtime will use them automatically at launch time.");
|
|
278
|
+
}
|
|
279
|
+
// --- Helpers ---
|
|
280
|
+
/**
|
|
281
|
+
* Grant iam:PassRole on the given role ARNs to the calling IAM user.
|
|
282
|
+
* Required so the CLI can assign roles to ECS tasks and Lambda functions.
|
|
283
|
+
*/
|
|
284
|
+
export async function grantPassRole(awsRegion, iamClient, roleArns, policyName) {
|
|
285
|
+
const stsClient = new STSClient({ region: awsRegion });
|
|
286
|
+
const identity = await stsClient.send(new GetCallerIdentityCommand({}));
|
|
287
|
+
const callerArn = identity.Arn;
|
|
288
|
+
// Extract user name from ARN (arn:aws:iam::ACCOUNT:user/USERNAME)
|
|
289
|
+
const userMatch = callerArn.match(/:user\/(.+)$/);
|
|
290
|
+
if (!userMatch) {
|
|
291
|
+
console.log(`\n Note: Caller ${callerArn} is not an IAM user — skipping iam:PassRole auto-grant.`);
|
|
292
|
+
console.log(` If you get PassRole errors, add this policy to your IAM identity:`);
|
|
293
|
+
console.log(JSON.stringify({
|
|
294
|
+
Version: "2012-10-17",
|
|
295
|
+
Statement: [{
|
|
296
|
+
Effect: "Allow",
|
|
297
|
+
Action: "iam:PassRole",
|
|
298
|
+
Resource: roleArns,
|
|
299
|
+
}],
|
|
300
|
+
}, null, 2));
|
|
301
|
+
return;
|
|
302
|
+
}
|
|
303
|
+
const userName = userMatch[1];
|
|
304
|
+
const policy = JSON.stringify({
|
|
305
|
+
Version: "2012-10-17",
|
|
306
|
+
Statement: [{
|
|
307
|
+
Effect: "Allow",
|
|
308
|
+
Action: "iam:PassRole",
|
|
309
|
+
Resource: roleArns,
|
|
310
|
+
}],
|
|
311
|
+
});
|
|
312
|
+
try {
|
|
313
|
+
await iamClient.send(new PutUserPolicyCommand({
|
|
314
|
+
UserName: userName,
|
|
315
|
+
PolicyName: policyName,
|
|
316
|
+
PolicyDocument: policy,
|
|
317
|
+
}));
|
|
318
|
+
console.log(` Granted iam:PassRole on ${roleArns.length} role(s) to user ${userName}`);
|
|
319
|
+
}
|
|
320
|
+
catch (err) {
|
|
321
|
+
console.log(` Warning: could not grant iam:PassRole to user ${userName}: ${err.message}`);
|
|
322
|
+
console.log(` You may need to manually add iam:PassRole permission for these roles:`);
|
|
323
|
+
for (const arn of roleArns) {
|
|
324
|
+
console.log(` - ${arn}`);
|
|
325
|
+
}
|
|
326
|
+
}
|
|
327
|
+
}
|
|
328
|
+
function gcloud(args, _project) {
|
|
329
|
+
return execFileSync("gcloud", args, {
|
|
330
|
+
encoding: "utf-8",
|
|
331
|
+
timeout: 30_000,
|
|
332
|
+
stdio: ["pipe", "pipe", "pipe"],
|
|
333
|
+
}).trim();
|
|
334
|
+
}
|
|
335
|
+
function listGsmSecretCount(gcpProject, prefix) {
|
|
336
|
+
try {
|
|
337
|
+
const output = gcloud([
|
|
338
|
+
"secrets", "list",
|
|
339
|
+
"--filter", `name:${prefix}--`,
|
|
340
|
+
"--format", "value(name)",
|
|
341
|
+
"--project", gcpProject,
|
|
342
|
+
], gcpProject);
|
|
343
|
+
if (!output.trim())
|
|
344
|
+
return 0;
|
|
345
|
+
return output.trim().split("\n").length;
|
|
346
|
+
}
|
|
347
|
+
catch {
|
|
348
|
+
return 0;
|
|
349
|
+
}
|
|
350
|
+
}
|
|
351
|
+
function listGsmFields(gcpProject, prefix, type, instance) {
|
|
352
|
+
const filter = `name:${prefix}--${type}--${instance}--`;
|
|
353
|
+
try {
|
|
354
|
+
const output = gcloud([
|
|
355
|
+
"secrets", "list",
|
|
356
|
+
"--filter", filter,
|
|
357
|
+
"--format", "value(name)",
|
|
358
|
+
"--project", gcpProject,
|
|
359
|
+
], gcpProject);
|
|
360
|
+
if (!output.trim())
|
|
361
|
+
return [];
|
|
362
|
+
const fields = [];
|
|
363
|
+
for (const line of output.split("\n")) {
|
|
364
|
+
const secretId = line.trim().split("/").pop();
|
|
365
|
+
const parts = secretId.split("--");
|
|
366
|
+
if (parts.length === 4 && parts[0] === prefix && parts[1] === type && parts[2] === instance) {
|
|
367
|
+
fields.push(parts[3]);
|
|
368
|
+
}
|
|
369
|
+
}
|
|
370
|
+
return fields;
|
|
371
|
+
}
|
|
372
|
+
catch {
|
|
373
|
+
return [];
|
|
374
|
+
}
|
|
375
|
+
}
|
|
376
|
+
export async function validateEcsRoles(projectPath, cloud) {
|
|
377
|
+
const { awsRegion } = cloud;
|
|
378
|
+
if (!awsRegion) {
|
|
379
|
+
throw new ConfigError("cloud.awsRegion is required for ECS validation");
|
|
380
|
+
}
|
|
381
|
+
const agents = discoverAgents(projectPath);
|
|
382
|
+
if (agents.length === 0)
|
|
383
|
+
return;
|
|
384
|
+
const iamClient = new IAMClient({ region: awsRegion });
|
|
385
|
+
const missing = [];
|
|
386
|
+
const hasIncorrectTrust = [];
|
|
387
|
+
for (const name of agents) {
|
|
388
|
+
const roleName = AWS_CONSTANTS.taskRoleName(name);
|
|
389
|
+
try {
|
|
390
|
+
const role = await iamClient.send(new GetRoleCommand({ RoleName: roleName }));
|
|
391
|
+
// Check if the role has the correct trust policy for ECS tasks
|
|
392
|
+
const trustPolicy = JSON.parse(decodeURIComponent(role.Role.AssumeRolePolicyDocument));
|
|
393
|
+
const hasEcsTrust = trustPolicy.Statement?.some((stmt) => stmt.Effect === "Allow" &&
|
|
394
|
+
stmt.Principal?.Service === "ecs-tasks.amazonaws.com" &&
|
|
395
|
+
(stmt.Action === "sts:AssumeRole" || stmt.Action?.includes("sts:AssumeRole")));
|
|
396
|
+
if (!hasEcsTrust) {
|
|
397
|
+
hasIncorrectTrust.push(roleName);
|
|
398
|
+
console.log(` [TRUST ISSUE] ${roleName} - missing ECS task trust policy`);
|
|
399
|
+
}
|
|
400
|
+
else {
|
|
401
|
+
console.log(` [ok] ${roleName}`);
|
|
402
|
+
}
|
|
403
|
+
}
|
|
404
|
+
catch (err) {
|
|
405
|
+
if (err.name === "NoSuchEntityException") {
|
|
406
|
+
missing.push(roleName);
|
|
407
|
+
console.log(` [MISSING] ${roleName}`);
|
|
408
|
+
}
|
|
409
|
+
else {
|
|
410
|
+
console.log(` [ERROR] ${roleName}: ${err.message}`);
|
|
411
|
+
}
|
|
412
|
+
}
|
|
413
|
+
}
|
|
414
|
+
if (missing.length > 0 || hasIncorrectTrust.length > 0) {
|
|
415
|
+
console.log(`\nFound IAM role issues that will cause ECS task failures:`);
|
|
416
|
+
if (missing.length > 0) {
|
|
417
|
+
console.log(`\n${missing.length} IAM task role(s) are missing:`);
|
|
418
|
+
missing.forEach(role => console.log(` - ${role}`));
|
|
419
|
+
console.log(`\nFix: Run 'al doctor -c' to create missing roles automatically.`);
|
|
420
|
+
}
|
|
421
|
+
if (hasIncorrectTrust.length > 0) {
|
|
422
|
+
console.log(`\n${hasIncorrectTrust.length} IAM role(s) have incorrect trust policies:`);
|
|
423
|
+
hasIncorrectTrust.forEach(role => console.log(` - ${role}`));
|
|
424
|
+
console.log(`\nFix: Update trust policy to allow ECS tasks to assume the role:`);
|
|
425
|
+
console.log(`For each role above, run:`);
|
|
426
|
+
console.log(` aws iam update-assume-role-policy --role-name ROLE_NAME --policy-document file://ecs-trust.json`);
|
|
427
|
+
}
|
|
428
|
+
console.log(`\nECS task trust policy (save as ecs-trust.json):`);
|
|
429
|
+
console.log(JSON.stringify({
|
|
430
|
+
Version: "2012-10-17",
|
|
431
|
+
Statement: [{
|
|
432
|
+
Effect: "Allow",
|
|
433
|
+
Principal: { Service: "ecs-tasks.amazonaws.com" },
|
|
434
|
+
Action: "sts:AssumeRole",
|
|
435
|
+
}],
|
|
436
|
+
}, null, 2));
|
|
437
|
+
console.log(`\nAlternatively, re-run the cloud setup to fix all issues:`);
|
|
438
|
+
console.log(` al cloud setup`);
|
|
439
|
+
// Throw error to prevent proceeding with invalid configuration
|
|
440
|
+
throw new CloudProviderError(`${missing.length + hasIncorrectTrust.length} IAM task role(s) have issues that will prevent ECS tasks from starting. Fix the roles above before proceeding.`);
|
|
441
|
+
}
|
|
442
|
+
else {
|
|
443
|
+
console.log(`All ${agents.length} IAM task role(s) exist and have correct trust policies.`);
|
|
444
|
+
}
|
|
445
|
+
}
|
|
446
|
+
async function ensureLambdaEcrPolicy(awsRegion, ecrRepoUri) {
|
|
447
|
+
const repoName = ecrRepoUri.split("/").pop();
|
|
448
|
+
if (!repoName)
|
|
449
|
+
return;
|
|
450
|
+
const ecrClient = new ECRClient({ region: awsRegion });
|
|
451
|
+
const policy = JSON.stringify({
|
|
452
|
+
Version: "2012-10-17",
|
|
453
|
+
Statement: [{
|
|
454
|
+
Sid: "LambdaECRImageRetrievalPolicy",
|
|
455
|
+
Effect: "Allow",
|
|
456
|
+
Principal: { Service: "lambda.amazonaws.com" },
|
|
457
|
+
Action: [
|
|
458
|
+
"ecr:BatchGetImage",
|
|
459
|
+
"ecr:GetDownloadUrlForLayer",
|
|
460
|
+
],
|
|
461
|
+
}],
|
|
462
|
+
});
|
|
463
|
+
try {
|
|
464
|
+
await ecrClient.send(new SetRepositoryPolicyCommand({
|
|
465
|
+
repositoryName: repoName,
|
|
466
|
+
policyText: policy,
|
|
467
|
+
}));
|
|
468
|
+
console.log(`ECR repository policy: granted Lambda pull access`);
|
|
469
|
+
}
|
|
470
|
+
catch (err) {
|
|
471
|
+
console.log(`Warning: could not set ECR repository policy for Lambda: ${err.message}`);
|
|
472
|
+
}
|
|
473
|
+
}
|
|
474
|
+
export async function reconcileLambdaRoles(projectPath, cloud) {
|
|
475
|
+
const { awsRegion, ecrRepository, awsSecretPrefix } = cloud;
|
|
476
|
+
if (!awsRegion || !ecrRepository)
|
|
477
|
+
return;
|
|
478
|
+
const secretPrefix = awsSecretPrefix || AWS_CONSTANTS.DEFAULT_SECRET_PREFIX;
|
|
479
|
+
const accountMatch = ecrRepository.match(/^(\d+)\.dkr\.ecr\./);
|
|
480
|
+
if (!accountMatch)
|
|
481
|
+
return;
|
|
482
|
+
const accountId = accountMatch[1];
|
|
483
|
+
const globalConfig = loadGlobalConfig(projectPath);
|
|
484
|
+
const agents = discoverAgents(projectPath);
|
|
485
|
+
const iamClient = new IAMClient({ region: awsRegion });
|
|
486
|
+
// Trust policy for Lambda
|
|
487
|
+
const trustPolicy = JSON.stringify({
|
|
488
|
+
Version: "2012-10-17",
|
|
489
|
+
Statement: [{
|
|
490
|
+
Effect: "Allow",
|
|
491
|
+
Principal: { Service: "lambda.amazonaws.com" },
|
|
492
|
+
Action: "sts:AssumeRole",
|
|
493
|
+
}],
|
|
494
|
+
});
|
|
495
|
+
let created = 0;
|
|
496
|
+
for (const name of agents) {
|
|
497
|
+
const config = loadAgentConfig(projectPath, name);
|
|
498
|
+
const effectiveTimeout = config.timeout ?? globalConfig.local?.timeout ?? 900;
|
|
499
|
+
// Only create Lambda roles for agents that will route to Lambda
|
|
500
|
+
if (effectiveTimeout > AWS_CONSTANTS.LAMBDA_MAX_TIMEOUT)
|
|
501
|
+
continue;
|
|
502
|
+
const roleName = AWS_CONSTANTS.lambdaRoleName(name);
|
|
503
|
+
// Create role
|
|
504
|
+
try {
|
|
505
|
+
await iamClient.send(new CreateRoleCommand({
|
|
506
|
+
RoleName: roleName,
|
|
507
|
+
AssumeRolePolicyDocument: trustPolicy,
|
|
508
|
+
}));
|
|
509
|
+
console.log(` Created Lambda role: ${roleName}`);
|
|
510
|
+
created++;
|
|
511
|
+
}
|
|
512
|
+
catch (err) {
|
|
513
|
+
if (err.name === "EntityAlreadyExistsException") {
|
|
514
|
+
console.log(` [ok] ${roleName}`);
|
|
515
|
+
}
|
|
516
|
+
else {
|
|
517
|
+
console.log(` [ERROR] ${roleName}: ${err.message}`);
|
|
518
|
+
continue;
|
|
519
|
+
}
|
|
520
|
+
}
|
|
521
|
+
// Add secrets + ECR + logs policy
|
|
522
|
+
const credRefs = [...new Set(config.credentials)];
|
|
523
|
+
if (config.model.authType !== "pi_auth" && !credRefs.includes("anthropic_key:default")) {
|
|
524
|
+
credRefs.push("anthropic_key:default");
|
|
525
|
+
}
|
|
526
|
+
const secretArns = credRefs.map((ref) => {
|
|
527
|
+
const { type, instance } = parseCredentialRef(ref);
|
|
528
|
+
return `arn:aws:secretsmanager:${awsRegion}:${accountId}:secret:${secretPrefix}/${type}/${instance}/*`;
|
|
529
|
+
});
|
|
530
|
+
const policy = JSON.stringify({
|
|
531
|
+
Version: "2012-10-17",
|
|
532
|
+
Statement: [
|
|
533
|
+
{
|
|
534
|
+
Effect: "Allow",
|
|
535
|
+
Action: "secretsmanager:GetSecretValue",
|
|
536
|
+
Resource: secretArns,
|
|
537
|
+
},
|
|
538
|
+
{
|
|
539
|
+
Effect: "Allow",
|
|
540
|
+
Action: [
|
|
541
|
+
"logs:CreateLogGroup",
|
|
542
|
+
"logs:CreateLogStream",
|
|
543
|
+
"logs:PutLogEvents",
|
|
544
|
+
],
|
|
545
|
+
Resource: `arn:aws:logs:${awsRegion}:${accountId}:*`,
|
|
546
|
+
},
|
|
547
|
+
{
|
|
548
|
+
Effect: "Allow",
|
|
549
|
+
Action: "ecr:GetAuthorizationToken",
|
|
550
|
+
Resource: "*",
|
|
551
|
+
},
|
|
552
|
+
{
|
|
553
|
+
Effect: "Allow",
|
|
554
|
+
Action: [
|
|
555
|
+
"ecr:BatchGetImage",
|
|
556
|
+
"ecr:GetDownloadUrlForLayer",
|
|
557
|
+
],
|
|
558
|
+
Resource: `arn:aws:ecr:${awsRegion}:${accountId}:repository/*`,
|
|
559
|
+
},
|
|
560
|
+
],
|
|
561
|
+
});
|
|
562
|
+
try {
|
|
563
|
+
await iamClient.send(new PutRolePolicyCommand({
|
|
564
|
+
RoleName: roleName,
|
|
565
|
+
PolicyName: "LambdaExecution",
|
|
566
|
+
PolicyDocument: policy,
|
|
567
|
+
}));
|
|
568
|
+
}
|
|
569
|
+
catch (err) {
|
|
570
|
+
console.log(` Warning: failed to put policy on ${roleName}: ${err.message}`);
|
|
571
|
+
}
|
|
572
|
+
}
|
|
573
|
+
if (created > 0) {
|
|
574
|
+
console.log(`Created ${created} Lambda execution role(s).`);
|
|
575
|
+
}
|
|
576
|
+
else {
|
|
577
|
+
console.log(`All Lambda roles up to date.`);
|
|
578
|
+
}
|
|
579
|
+
// Grant iam:PassRole on Lambda roles to the calling identity
|
|
580
|
+
const lambdaRoleArns = agents
|
|
581
|
+
.filter((name) => {
|
|
582
|
+
const config = loadAgentConfig(projectPath, name);
|
|
583
|
+
const effectiveTimeout = config.timeout ?? globalConfig.local?.timeout ?? 900;
|
|
584
|
+
return effectiveTimeout <= AWS_CONSTANTS.LAMBDA_MAX_TIMEOUT;
|
|
585
|
+
})
|
|
586
|
+
.map((name) => `arn:aws:iam::${accountId}:role/${AWS_CONSTANTS.lambdaRoleName(name)}`);
|
|
587
|
+
if (lambdaRoleArns.length > 0) {
|
|
588
|
+
await grantPassRole(awsRegion, iamClient, lambdaRoleArns, "ActionLlamaLambdaPassRole");
|
|
589
|
+
}
|
|
590
|
+
}
|
|
591
|
+
//# sourceMappingURL=cloud-iam.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cloud-iam.js","sourceRoot":"","sources":["../../../src/cli/commands/cloud-iam.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAEH,OAAO,EAAE,YAAY,EAAE,MAAM,eAAe,CAAC;AAC7C,OAAO,EAAE,OAAO,EAAE,MAAM,mBAAmB,CAAC;AAC5C,OAAO,EAAE,SAAS,EAAE,wBAAwB,EAAE,MAAM,qBAAqB,CAAC;AAC1E,OAAO,EAAE,SAAS,EAAE,iBAAiB,EAAE,oBAAoB,EAAE,oBAAoB,EAAE,cAAc,EAAE,MAAM,qBAAqB,CAAC;AAC/H,OAAO,EAAE,SAAS,EAAE,0BAA0B,EAAE,MAAM,qBAAqB,CAAC;AAC5E,OAAO,EAAE,cAAc,EAAE,eAAe,EAAE,gBAAgB,EAAE,MAAM,wBAAwB,CAAC;AAE3F,OAAO,EAAE,kBAAkB,EAAE,MAAM,6BAA6B,CAAC;AACjE,OAAO,EAAE,aAAa,EAAE,MAAM,+BAA+B,CAAC;AAC9D,OAAO,EAAE,WAAW,EAAE,kBAAkB,EAAE,MAAM,wBAAwB,CAAC;AAEzE,MAAM,CAAC,KAAK,UAAU,iBAAiB,CAAC,WAAmB,EAAE,KAAkB;IAC7E,IAAI,KAAK,CAAC,QAAQ,KAAK,WAAW,EAAE,CAAC;QACnC,MAAM,YAAY,CAAC,WAAW,EAAE,KAAK,CAAC,CAAC;IACzC,CAAC;SAAM,IAAI,KAAK,CAAC,QAAQ,KAAK,KAAK,EAAE,CAAC;QACpC,MAAM,YAAY,CAAC,WAAW,EAAE,KAAK,CAAC,CAAC;IACzC,CAAC;SAAM,CAAC;QACN,MAAM,IAAI,kBAAkB,CAAC,4BAA4B,KAAK,CAAC,QAAQ,GAAG,CAAC,CAAC;IAC9E,CAAC;AACH,CAAC;AAED,KAAK,UAAU,YAAY,CAAC,WAAmB,EAAE,KAAkB;IACjE,MAAM,EAAE,UAAU,EAAE,YAAY,EAAE,YAAY,EAAE,GAAG,KAAK,CAAC;IACzD,IAAI,CAAC,UAAU,EAAE,CAAC;QAChB,MAAM,IAAI,WAAW,CAAC,6CAA6C,CAAC,CAAC;IACvE,CAAC;IAED,MAAM,YAAY,GAAG,YAAY,IAAI,aAAa,CAAC,qBAAqB,CAAC;IAEzE,+CAA+C;IAC/C,IAAI,CAAC;QACH,MAAM,CAAC,CAAC,MAAM,EAAE,oBAAoB,CAAC,EAAE,UAAU,CAAC,CAAC;IACrD,CAAC;IAAC,OAAO,GAAQ,EAAE,CAAC;QAClB,MAAM,IAAI,kBAAkB,CAC1B,mEAAmE;YACnE,mBAAmB,GAAG,CAAC,OAAO,EAAE,CACjC,CAAC;IACJ,CAAC;IAED,MAAM,MAAM,GAAG,cAAc,CAAC,WAAW,CAAC,CAAC;IAC3C,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACxB,OAAO,CAAC,GAAG,CAAC,uCAAuC,CAAC,CAAC;QACrD,OAAO;IACT,CAAC;IAED,iEAAiE;IACjE,MAAM,SAAS,GAAG,kBAAkB,CAAC,UAAU,EAAE,YAAY,CAAC,CAAC;IAC/D,IAAI,SAAS,KAAK,CAAC,EAAE,CAAC;QACpB,OAAO,CAAC,GAAG,CACT,mDAAmD,YAAY,MAAM;YACrE,4FAA4F,CAC7F,CAAC;QACF,MAAM,OAAO,GAAG,MAAM,OAAO,CAAC;YAC5B,OAAO,EAAE,kFAAkF;YAC3F,OAAO,EAAE,KAAK;SACf,CAAC,CAAC;QACH,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,CAAC,GAAG,CAAC,+CAA+C,CAAC,CAAC;YAC7D,OAAO;QACT,CAAC;IACH,CAAC;IAED,OAAO,CAAC,GAAG,CAAC,+CAA+C,MAAM,CAAC,MAAM,gBAAgB,CAAC,CAAC;IAE1F,KAAK,MAAM,IAAI,IAAI,MAAM,EAAE,CAAC;QAC1B,MAAM,MAAM,GAAG,eAAe,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAClD,MAAM,MAAM,GAAG,aAAa,CAAC,kBAAkB,CAAC,IAAI,CAAC,CAAC;QACtD,MAAM,OAAO,GAAG,aAAa,CAAC,mBAAmB,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAEpE,OAAO,CAAC,GAAG,CAAC,YAAY,IAAI,EAAE,CAAC,CAAC;QAChC,OAAO,CAAC,GAAG,CAAC,WAAW,OAAO,EAAE,CAAC,CAAC;QAElC,yCAAyC;QACzC,IAAI,CAAC;YACH,MAAM,CAAC;gBACL,KAAK,EAAE,kBAAkB,EAAE,QAAQ,EAAE,MAAM;gBAC3C,gBAAgB,EAAE,uBAAuB,IAAI,EAAE;gBAC/C,WAAW,EAAE,UAAU;aACxB,EAAE,UAAU,CAAC,CAAC;YACf,OAAO,CAAC,GAAG,CAAC,6BAA6B,CAAC,CAAC;QAC7C,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,IAAI,GAAG,CAAC,OAAO,EAAE,QAAQ,CAAC,gBAAgB,CAAC,EAAE,CAAC;gBAC5C,OAAO,CAAC,GAAG,CAAC,oCAAoC,CAAC,CAAC;YACpD,CAAC;iBAAM,CAAC;gBACN,MAAM,GAAG,CAAC;YACZ,CAAC;QACH,CAAC;QAED,+CAA+C;QAC/C,MAAM,QAAQ,GAAG,CAAC,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,CAAC;QAClD,IAAI,MAAM,CAAC,KAAK,CAAC,QAAQ,KAAK,SAAS,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,uBAAuB,CAAC,EAAE,CAAC;YACvF,QAAQ,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC;QACzC,CAAC;QAED,MAAM,WAAW,GAAa,EAAE,CAAC;QACjC,KAAK,MAAM,GAAG,IAAI,QAAQ,EAAE,CAAC;YAC3B,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;YACnD,MAAM,MAAM,GAAG,aAAa,CAAC,UAAU,EAAE,YAAY,EAAE,IAAI,EAAE,QAAQ,CAAC,CAAC;YACvE,KAAK,MAAM,KAAK,IAAI,MAAM,EAAE,CAAC;gBAC3B,WAAW,CAAC,IAAI,CAAC,GAAG,YAAY,KAAK,IAAI,KAAK,QAAQ,KAAK,KAAK,EAAE,CAAC,CAAC;YACtE,CAAC;QACH,CAAC;QAED,uDAAuD;QACvD,IAAI,UAAU,GAAG,CAAC,CAAC;QACnB,KAAK,MAAM,UAAU,IAAI,WAAW,EAAE,CAAC;YACrC,IAAI,CAAC;gBACH,MAAM,CAAC;oBACL,SAAS,EAAE,wBAAwB,EAAE,UAAU;oBAC/C,UAAU,EAAE,kBAAkB,OAAO,EAAE;oBACvC,QAAQ,EAAE,oCAAoC;oBAC9C,WAAW,EAAE,UAAU;iBACxB,EAAE,UAAU,CAAC,CAAC;gBACf,UAAU,EAAE,CAAC;YACf,CAAC;YAAC,OAAO,GAAQ,EAAE,CAAC;gBAClB,IAAI,GAAG,CAAC,OAAO,EAAE,QAAQ,CAAC,gBAAgB,CAAC,IAAI,GAAG,CAAC,OAAO,EAAE,QAAQ,CAAC,aAAa,CAAC,EAAE,CAAC;oBACpF,UAAU,EAAE,CAAC;gBACf,CAAC;qBAAM,CAAC;oBACN,OAAO,CAAC,GAAG,CAAC,+BAA+B,UAAU,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBAC3E,CAAC;YACH,CAAC;QACH,CAAC;QACD,OAAO,CAAC,GAAG,CAAC,aAAa,UAAU,YAAY,CAAC,CAAC;QAEjD,4EAA4E;QAC5E,IAAI,CAAC;YACH,MAAM,CAAC;gBACL,KAAK,EAAE,kBAAkB,EAAE,wBAAwB,EAAE,OAAO;gBAC5D,UAAU,EAAE,kBAAkB,OAAO,EAAE;gBACvC,QAAQ,EAAE,8BAA8B;gBACxC,WAAW,EAAE,UAAU;aACxB,EAAE,UAAU,CAAC,CAAC;QACjB,CAAC;QAAC,MAAM,CAAC;YACP,uBAAuB;QACzB,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;IAClB,CAAC;IAED,OAAO,CAAC,GAAG,CAAC,gGAAgG,CAAC,CAAC;AAChH,CAAC;AAED,KAAK,UAAU,YAAY,CAAC,WAAmB,EAAE,KAAkB;IACjE,MAAM,EAAE,SAAS,EAAE,aAAa,EAAE,eAAe,EAAE,GAAG,KAAK,CAAC;IAC5D,IAAI,CAAC,SAAS,EAAE,CAAC;QACf,MAAM,IAAI,WAAW,CAAC,4CAA4C,CAAC,CAAC;IACtE,CAAC;IACD,IAAI,CAAC,aAAa,EAAE,CAAC;QACnB,MAAM,IAAI,WAAW,CAAC,gDAAgD,CAAC,CAAC;IAC1E,CAAC;IAED,MAAM,YAAY,GAAG,eAAe,IAAI,aAAa,CAAC,qBAAqB,CAAC;IAE5E,uCAAuC;IACvC,MAAM,YAAY,GAAG,aAAa,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC;IAC/D,IAAI,CAAC,YAAY,EAAE,CAAC;QAClB,MAAM,IAAI,WAAW,CACnB,4DAA4D,aAAa,KAAK;YAC9E,qEAAqE,CACtE,CAAC;IACJ,CAAC;IACD,MAAM,SAAS,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;IAElC,mCAAmC;IACnC,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IACvD,IAAI,CAAC;QACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,wBAAwB,CAAC,EAAE,CAAC,CAAC,CAAC;IACzD,CAAC;IAAC,OAAO,GAAQ,EAAE,CAAC;QAClB,MAAM,IAAI,kBAAkB,CAC1B,qGAAqG;YACrG,mBAAmB,GAAG,CAAC,OAAO,EAAE,CACjC,CAAC;IACJ,CAAC;IAED,MAAM,MAAM,GAAG,cAAc,CAAC,WAAW,CAAC,CAAC;IAC3C,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACxB,OAAO,CAAC,GAAG,CAAC,uCAAuC,CAAC,CAAC;QACrD,OAAO;IACT,CAAC;IAED,6BAA6B;IAC7B,MAAM,WAAW,GAAG,IAAI,CAAC,SAAS,CAAC;QACjC,OAAO,EAAE,YAAY;QACrB,SAAS,EAAE,CAAC;gBACV,MAAM,EAAE,OAAO;gBACf,SAAS,EAAE,EAAE,OAAO,EAAE,yBAAyB,EAAE;gBACjD,MAAM,EAAE,gBAAgB;aACzB,CAAC;KACH,CAAC,CAAC;IAEH,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IAEvD,0FAA0F;IAC1F,IAAI,KAAK,CAAC,gBAAgB,EAAE,CAAC;QAC3B,MAAM,iBAAiB,GAAG,KAAK,CAAC,gBAAgB,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAG,CAAC;QACnE,IAAI,CAAC;YACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,oBAAoB,CAAC;gBAC5C,QAAQ,EAAE,iBAAiB;gBAC3B,UAAU,EAAE,sBAAsB;gBAClC,cAAc,EAAE,IAAI,CAAC,SAAS,CAAC;oBAC7B,OAAO,EAAE,YAAY;oBACrB,SAAS,EAAE;wBACT;4BACE,MAAM,EAAE,OAAO;4BACf,MAAM,EAAE,+BAA+B;4BACvC,QAAQ,EAAE,0BAA0B,SAAS,IAAI,SAAS,WAAW,YAAY,IAAI;yBACtF;wBACD;4BACE,MAAM,EAAE,OAAO;4BACf,MAAM,EAAE,qBAAqB;4BAC7B,QAAQ,EAAE,gBAAgB,SAAS,IAAI,SAAS,cAAc,aAAa,CAAC,SAAS,GAAG;yBACzF;qBACF;iBACF,CAAC;aACH,CAAC,CAAC,CAAC;YACJ,OAAO,CAAC,GAAG,CAAC,mBAAmB,iBAAiB,gDAAgD,CAAC,CAAC;QACpG,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,IAAI,kBAAkB,CAC1B,mDAAmD,iBAAiB,KAAK,GAAG,CAAC,OAAO,IAAI;gBACxF,+FAA+F;gBAC/F,8GAA8G,CAC/G,CAAC;QACJ,CAAC;IACH,CAAC;IAED,yDAAyD;IACzD,MAAM,qBAAqB,CAAC,SAAS,EAAE,aAAa,CAAC,CAAC;IAEtD,OAAO,CAAC,GAAG,CAAC,mCAAmC,MAAM,CAAC,MAAM,gBAAgB,CAAC,CAAC;IAE9E,KAAK,MAAM,IAAI,IAAI,MAAM,EAAE,CAAC;QAC1B,MAAM,MAAM,GAAG,eAAe,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAClD,MAAM,QAAQ,GAAG,aAAa,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC;QAElD,OAAO,CAAC,GAAG,CAAC,YAAY,IAAI,EAAE,CAAC,CAAC;QAChC,OAAO,CAAC,GAAG,CAAC,aAAa,QAAQ,EAAE,CAAC,CAAC;QAErC,kCAAkC;QAClC,IAAI,CAAC;YACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,iBAAiB,CAAC;gBACzC,QAAQ,EAAE,QAAQ;gBAClB,wBAAwB,EAAE,WAAW;aACtC,CAAC,CAAC,CAAC;YACJ,OAAO,CAAC,GAAG,CAAC,sBAAsB,CAAC,CAAC;QACtC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,IAAI,GAAG,CAAC,IAAI,KAAK,8BAA8B,EAAE,CAAC;gBAChD,OAAO,CAAC,GAAG,CAAC,6BAA6B,CAAC,CAAC;YAC7C,CAAC;iBAAM,CAAC;gBACN,MAAM,GAAG,CAAC;YACZ,CAAC;QACH,CAAC;QAED,0CAA0C;QAC1C,MAAM,QAAQ,GAAG,CAAC,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,CAAC;QAClD,IAAI,MAAM,CAAC,KAAK,CAAC,QAAQ,KAAK,SAAS,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,uBAAuB,CAAC,EAAE,CAAC;YACvF,QAAQ,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC;QACzC,CAAC;QAED,MAAM,UAAU,GAAa,EAAE,CAAC;QAChC,KAAK,MAAM,GAAG,IAAI,QAAQ,EAAE,CAAC;YAC3B,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;YACnD,UAAU,CAAC,IAAI,CACb,0BAA0B,SAAS,IAAI,SAAS,WAAW,YAAY,IAAI,IAAI,IAAI,QAAQ,IAAI,CAChG,CAAC;QACJ,CAAC;QAED,kDAAkD;QAClD,IAAI,UAAU,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YAC1B,MAAM,MAAM,GAAG,IAAI,CAAC,SAAS,CAAC;gBAC5B,OAAO,EAAE,YAAY;gBACrB,SAAS,EAAE,CAAC;wBACV,MAAM,EAAE,OAAO;wBACf,MAAM,EAAE,+BAA+B;wBACvC,QAAQ,EAAE,UAAU;qBACrB,CAAC;aACH,CAAC,CAAC;YAEH,IAAI,CAAC;gBACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,oBAAoB,CAAC;oBAC5C,QAAQ,EAAE,QAAQ;oBAClB,UAAU,EAAE,eAAe;oBAC3B,cAAc,EAAE,MAAM;iBACvB,CAAC,CAAC,CAAC;gBACJ,OAAO,CAAC,GAAG,CAAC,aAAa,UAAU,CAAC,MAAM,iBAAiB,CAAC,CAAC;YAC/D,CAAC;YAAC,OAAO,GAAQ,EAAE,CAAC;gBAClB,OAAO,CAAC,GAAG,CAAC,sCAAsC,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACnE,CAAC;QACH,CAAC;aAAM,CAAC;YACN,OAAO,CAAC,GAAG,CAAC,wBAAwB,CAAC,CAAC;QACxC,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,EAAE,CAAC,CAAC;IAClB,CAAC;IAED,gFAAgF;IAChF,MAAM,YAAY,GAAG,MAAM,CAAC,GAAG,CAC7B,CAAC,IAAI,EAAE,EAAE,CAAC,gBAAgB,SAAS,SAAS,aAAa,CAAC,YAAY,CAAC,IAAI,CAAC,EAAE,CAC/E,CAAC;IACF,IAAI,KAAK,CAAC,gBAAgB,EAAE,CAAC;QAC3B,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC;IAC5C,CAAC;IACD,IAAI,YAAY,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QAC5B,MAAM,aAAa,CAAC,SAAS,EAAE,SAAS,EAAE,YAAY,EAAE,wBAAwB,CAAC,CAAC;IACpF,CAAC;IAED,OAAO,CAAC,GAAG,CAAC,8FAA8F,CAAC,CAAC;IAC5G,OAAO,CAAC,GAAG,CAAC,8DAA8D,CAAC,CAAC;IAC5E,OAAO,CAAC,GAAG,CAAC,6DAA6D,CAAC,CAAC;AAC7E,CAAC;AAED,kBAAkB;AAElB;;;GAGG;AACH,MAAM,CAAC,KAAK,UAAU,aAAa,CACjC,SAAiB,EACjB,SAAoB,EACpB,QAAkB,EAClB,UAAkB;IAElB,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IACvD,MAAM,QAAQ,GAAG,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,wBAAwB,CAAC,EAAE,CAAC,CAAC,CAAC;IACxE,MAAM,SAAS,GAAG,QAAQ,CAAC,GAAI,CAAC;IAEhC,kEAAkE;IAClE,MAAM,SAAS,GAAG,SAAS,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC;IAClD,IAAI,CAAC,SAAS,EAAE,CAAC;QACf,OAAO,CAAC,GAAG,CAAC,oBAAoB,SAAS,yDAAyD,CAAC,CAAC;QACpG,OAAO,CAAC,GAAG,CAAC,qEAAqE,CAAC,CAAC;QACnF,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,SAAS,CAAC;YACzB,OAAO,EAAE,YAAY;YACrB,SAAS,EAAE,CAAC;oBACV,MAAM,EAAE,OAAO;oBACf,MAAM,EAAE,cAAc;oBACtB,QAAQ,EAAE,QAAQ;iBACnB,CAAC;SACH,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QACb,OAAO;IACT,CAAC;IAED,MAAM,QAAQ,GAAG,SAAS,CAAC,CAAC,CAAC,CAAC;IAC9B,MAAM,MAAM,GAAG,IAAI,CAAC,SAAS,CAAC;QAC5B,OAAO,EAAE,YAAY;QACrB,SAAS,EAAE,CAAC;gBACV,MAAM,EAAE,OAAO;gBACf,MAAM,EAAE,cAAc;gBACtB,QAAQ,EAAE,QAAQ;aACnB,CAAC;KACH,CAAC,CAAC;IAEH,IAAI,CAAC;QACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,oBAAoB,CAAC;YAC5C,QAAQ,EAAE,QAAQ;YAClB,UAAU,EAAE,UAAU;YACtB,cAAc,EAAE,MAAM;SACvB,CAAC,CAAC,CAAC;QACJ,OAAO,CAAC,GAAG,CAAC,6BAA6B,QAAQ,CAAC,MAAM,oBAAoB,QAAQ,EAAE,CAAC,CAAC;IAC1F,CAAC;IAAC,OAAO,GAAQ,EAAE,CAAC;QAClB,OAAO,CAAC,GAAG,CAAC,mDAAmD,QAAQ,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;QAC3F,OAAO,CAAC,GAAG,CAAC,yEAAyE,CAAC,CAAC;QACvF,KAAK,MAAM,GAAG,IAAI,QAAQ,EAAE,CAAC;YAC3B,OAAO,CAAC,GAAG,CAAC,SAAS,GAAG,EAAE,CAAC,CAAC;QAC9B,CAAC;IACH,CAAC;AACH,CAAC;AAED,SAAS,MAAM,CAAC,IAAc,EAAE,QAAgB;IAC9C,OAAO,YAAY,CAAC,QAAQ,EAAE,IAAI,EAAE;QAClC,QAAQ,EAAE,OAAO;QACjB,OAAO,EAAE,MAAM;QACf,KAAK,EAAE,CAAC,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC;KAChC,CAAC,CAAC,IAAI,EAAE,CAAC;AACZ,CAAC;AAED,SAAS,kBAAkB,CAAC,UAAkB,EAAE,MAAc;IAC5D,IAAI,CAAC;QACH,MAAM,MAAM,GAAG,MAAM,CAAC;YACpB,SAAS,EAAE,MAAM;YACjB,UAAU,EAAE,QAAQ,MAAM,IAAI;YAC9B,UAAU,EAAE,aAAa;YACzB,WAAW,EAAE,UAAU;SACxB,EAAE,UAAU,CAAC,CAAC;QACf,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE;YAAE,OAAO,CAAC,CAAC;QAC7B,OAAO,MAAM,CAAC,IAAI,EAAE,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,MAAM,CAAC;IAC1C,CAAC;IAAC,MAAM,CAAC;QACP,OAAO,CAAC,CAAC;IACX,CAAC;AACH,CAAC;AAED,SAAS,aAAa,CACpB,UAAkB,EAClB,MAAc,EACd,IAAY,EACZ,QAAgB;IAEhB,MAAM,MAAM,GAAG,QAAQ,MAAM,KAAK,IAAI,KAAK,QAAQ,IAAI,CAAC;IACxD,IAAI,CAAC;QACH,MAAM,MAAM,GAAG,MAAM,CAAC;YACpB,SAAS,EAAE,MAAM;YACjB,UAAU,EAAE,MAAM;YAClB,UAAU,EAAE,aAAa;YACzB,WAAW,EAAE,UAAU;SACxB,EAAE,UAAU,CAAC,CAAC;QAEf,IAAI,CAAC,MAAM,CAAC,IAAI,EAAE;YAAE,OAAO,EAAE,CAAC;QAE9B,MAAM,MAAM,GAAa,EAAE,CAAC;QAC5B,KAAK,MAAM,IAAI,IAAI,MAAM,CAAC,KAAK,CAAC,IAAI,CAAC,EAAE,CAAC;YACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAG,CAAC;YAC/C,MAAM,KAAK,GAAG,QAAQ,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;YACnC,IAAI,KAAK,CAAC,MAAM,KAAK,CAAC,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,MAAM,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,IAAI,IAAI,KAAK,CAAC,CAAC,CAAC,KAAK,QAAQ,EAAE,CAAC;gBAC5F,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC;YACxB,CAAC;QACH,CAAC;QACD,OAAO,MAAM,CAAC;IAChB,CAAC;IAAC,MAAM,CAAC;QACP,OAAO,EAAE,CAAC;IACZ,CAAC;AACH,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,gBAAgB,CAAC,WAAmB,EAAE,KAAkB;IAC5E,MAAM,EAAE,SAAS,EAAE,GAAG,KAAK,CAAC;IAC5B,IAAI,CAAC,SAAS,EAAE,CAAC;QACf,MAAM,IAAI,WAAW,CAAC,gDAAgD,CAAC,CAAC;IAC1E,CAAC;IAED,MAAM,MAAM,GAAG,cAAc,CAAC,WAAW,CAAC,CAAC;IAC3C,IAAI,MAAM,CAAC,MAAM,KAAK,CAAC;QAAE,OAAO;IAEhC,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IACvD,MAAM,OAAO,GAAa,EAAE,CAAC;IAC7B,MAAM,iBAAiB,GAAa,EAAE,CAAC;IAEvC,KAAK,MAAM,IAAI,IAAI,MAAM,EAAE,CAAC;QAC1B,MAAM,QAAQ,GAAG,aAAa,CAAC,YAAY,CAAC,IAAI,CAAC,CAAC;QAElD,IAAI,CAAC;YACH,MAAM,IAAI,GAAG,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,cAAc,CAAC,EAAE,QAAQ,EAAE,QAAQ,EAAE,CAAC,CAAC,CAAC;YAE9E,+DAA+D;YAC/D,MAAM,WAAW,GAAG,IAAI,CAAC,KAAK,CAAC,kBAAkB,CAAC,IAAI,CAAC,IAAK,CAAC,wBAAyB,CAAC,CAAC,CAAC;YACzF,MAAM,WAAW,GAAG,WAAW,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC,IAAS,EAAE,EAAE,CAC5D,IAAI,CAAC,MAAM,KAAK,OAAO;gBACvB,IAAI,CAAC,SAAS,EAAE,OAAO,KAAK,yBAAyB;gBACrD,CAAC,IAAI,CAAC,MAAM,KAAK,gBAAgB,IAAI,IAAI,CAAC,MAAM,EAAE,QAAQ,CAAC,gBAAgB,CAAC,CAAC,CAC9E,CAAC;YAEF,IAAI,CAAC,WAAW,EAAE,CAAC;gBACjB,iBAAiB,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;gBACjC,OAAO,CAAC,GAAG,CAAC,mBAAmB,QAAQ,kCAAkC,CAAC,CAAC;YAC7E,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,UAAU,QAAQ,EAAE,CAAC,CAAC;YACpC,CAAC;QACH,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,IAAI,GAAG,CAAC,IAAI,KAAK,uBAAuB,EAAE,CAAC;gBACzC,OAAO,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;gBACvB,OAAO,CAAC,GAAG,CAAC,eAAe,QAAQ,EAAE,CAAC,CAAC;YACzC,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,aAAa,QAAQ,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;YACvD,CAAC;QACH,CAAC;IACH,CAAC;IAED,IAAI,OAAO,CAAC,MAAM,GAAG,CAAC,IAAI,iBAAiB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QACvD,OAAO,CAAC,GAAG,CAAC,4DAA4D,CAAC,CAAC;QAE1E,IAAI,OAAO,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACvB,OAAO,CAAC,GAAG,CAAC,KAAK,OAAO,CAAC,MAAM,gCAAgC,CAAC,CAAC;YACjE,OAAO,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC,OAAO,CAAC,GAAG,CAAC,OAAO,IAAI,EAAE,CAAC,CAAC,CAAC;YACpD,OAAO,CAAC,GAAG,CAAC,kEAAkE,CAAC,CAAC;QAClF,CAAC;QAED,IAAI,iBAAiB,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;YACjC,OAAO,CAAC,GAAG,CAAC,KAAK,iBAAiB,CAAC,MAAM,6CAA6C,CAAC,CAAC;YACxF,iBAAiB,CAAC,OAAO,CAAC,IAAI,CAAC,EAAE,CAAC,OAAO,CAAC,GAAG,CAAC,OAAO,IAAI,EAAE,CAAC,CAAC,CAAC;YAC9D,OAAO,CAAC,GAAG,CAAC,mEAAmE,CAAC,CAAC;YACjF,OAAO,CAAC,GAAG,CAAC,2BAA2B,CAAC,CAAC;YACzC,OAAO,CAAC,GAAG,CAAC,mGAAmG,CAAC,CAAC;QACnH,CAAC;QAED,OAAO,CAAC,GAAG,CAAC,mDAAmD,CAAC,CAAC;QACjE,OAAO,CAAC,GAAG,CAAC,IAAI,CAAC,SAAS,CAAC;YACzB,OAAO,EAAE,YAAY;YACrB,SAAS,EAAE,CAAC;oBACV,MAAM,EAAE,OAAO;oBACf,SAAS,EAAE,EAAE,OAAO,EAAE,yBAAyB,EAAE;oBACjD,MAAM,EAAE,gBAAgB;iBACzB,CAAC;SACH,EAAE,IAAI,EAAE,CAAC,CAAC,CAAC,CAAC;QAEb,OAAO,CAAC,GAAG,CAAC,4DAA4D,CAAC,CAAC;QAC1E,OAAO,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;QAEhC,+DAA+D;QAC/D,MAAM,IAAI,kBAAkB,CAAC,GAAG,OAAO,CAAC,MAAM,GAAG,iBAAiB,CAAC,MAAM,iHAAiH,CAAC,CAAC;IAC9L,CAAC;SAAM,CAAC;QACN,OAAO,CAAC,GAAG,CAAC,OAAO,MAAM,CAAC,MAAM,0DAA0D,CAAC,CAAC;IAC9F,CAAC;AACH,CAAC;AAED,KAAK,UAAU,qBAAqB,CAAC,SAAiB,EAAE,UAAkB;IACxE,MAAM,QAAQ,GAAG,UAAU,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,CAAC;IAC7C,IAAI,CAAC,QAAQ;QAAE,OAAO;IAEtB,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IACvD,MAAM,MAAM,GAAG,IAAI,CAAC,SAAS,CAAC;QAC5B,OAAO,EAAE,YAAY;QACrB,SAAS,EAAE,CAAC;gBACV,GAAG,EAAE,+BAA+B;gBACpC,MAAM,EAAE,OAAO;gBACf,SAAS,EAAE,EAAE,OAAO,EAAE,sBAAsB,EAAE;gBAC9C,MAAM,EAAE;oBACN,mBAAmB;oBACnB,4BAA4B;iBAC7B;aACF,CAAC;KACH,CAAC,CAAC;IAEH,IAAI,CAAC;QACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,0BAA0B,CAAC;YAClD,cAAc,EAAE,QAAQ;YACxB,UAAU,EAAE,MAAM;SACnB,CAAC,CAAC,CAAC;QACJ,OAAO,CAAC,GAAG,CAAC,mDAAmD,CAAC,CAAC;IACnE,CAAC;IAAC,OAAO,GAAQ,EAAE,CAAC;QAClB,OAAO,CAAC,GAAG,CAAC,4DAA4D,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;IACzF,CAAC;AACH,CAAC;AAED,MAAM,CAAC,KAAK,UAAU,oBAAoB,CAAC,WAAmB,EAAE,KAAkB;IAChF,MAAM,EAAE,SAAS,EAAE,aAAa,EAAE,eAAe,EAAE,GAAG,KAAK,CAAC;IAC5D,IAAI,CAAC,SAAS,IAAI,CAAC,aAAa;QAAE,OAAO;IAEzC,MAAM,YAAY,GAAG,eAAe,IAAI,aAAa,CAAC,qBAAqB,CAAC;IAC5E,MAAM,YAAY,GAAG,aAAa,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC;IAC/D,IAAI,CAAC,YAAY;QAAE,OAAO;IAC1B,MAAM,SAAS,GAAG,YAAY,CAAC,CAAC,CAAC,CAAC;IAElC,MAAM,YAAY,GAAG,gBAAgB,CAAC,WAAW,CAAC,CAAC;IACnD,MAAM,MAAM,GAAG,cAAc,CAAC,WAAW,CAAC,CAAC;IAC3C,MAAM,SAAS,GAAG,IAAI,SAAS,CAAC,EAAE,MAAM,EAAE,SAAS,EAAE,CAAC,CAAC;IAEvD,0BAA0B;IAC1B,MAAM,WAAW,GAAG,IAAI,CAAC,SAAS,CAAC;QACjC,OAAO,EAAE,YAAY;QACrB,SAAS,EAAE,CAAC;gBACV,MAAM,EAAE,OAAO;gBACf,SAAS,EAAE,EAAE,OAAO,EAAE,sBAAsB,EAAE;gBAC9C,MAAM,EAAE,gBAAgB;aACzB,CAAC;KACH,CAAC,CAAC;IAEH,IAAI,OAAO,GAAG,CAAC,CAAC;IAChB,KAAK,MAAM,IAAI,IAAI,MAAM,EAAE,CAAC;QAC1B,MAAM,MAAM,GAAG,eAAe,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAClD,MAAM,gBAAgB,GAAG,MAAM,CAAC,OAAO,IAAI,YAAY,CAAC,KAAK,EAAE,OAAO,IAAI,GAAG,CAAC;QAE9E,gEAAgE;QAChE,IAAI,gBAAgB,GAAG,aAAa,CAAC,kBAAkB;YAAE,SAAS;QAElE,MAAM,QAAQ,GAAG,aAAa,CAAC,cAAc,CAAC,IAAI,CAAC,CAAC;QAEpD,cAAc;QACd,IAAI,CAAC;YACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,iBAAiB,CAAC;gBACzC,QAAQ,EAAE,QAAQ;gBAClB,wBAAwB,EAAE,WAAW;aACtC,CAAC,CAAC,CAAC;YACJ,OAAO,CAAC,GAAG,CAAC,0BAA0B,QAAQ,EAAE,CAAC,CAAC;YAClD,OAAO,EAAE,CAAC;QACZ,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,IAAI,GAAG,CAAC,IAAI,KAAK,8BAA8B,EAAE,CAAC;gBAChD,OAAO,CAAC,GAAG,CAAC,UAAU,QAAQ,EAAE,CAAC,CAAC;YACpC,CAAC;iBAAM,CAAC;gBACN,OAAO,CAAC,GAAG,CAAC,aAAa,QAAQ,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;gBACrD,SAAS;YACX,CAAC;QACH,CAAC;QAED,kCAAkC;QAClC,MAAM,QAAQ,GAAG,CAAC,GAAG,IAAI,GAAG,CAAC,MAAM,CAAC,WAAW,CAAC,CAAC,CAAC;QAClD,IAAI,MAAM,CAAC,KAAK,CAAC,QAAQ,KAAK,SAAS,IAAI,CAAC,QAAQ,CAAC,QAAQ,CAAC,uBAAuB,CAAC,EAAE,CAAC;YACvF,QAAQ,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC;QACzC,CAAC;QAED,MAAM,UAAU,GAAa,QAAQ,CAAC,GAAG,CAAC,CAAC,GAAG,EAAE,EAAE;YAChD,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,kBAAkB,CAAC,GAAG,CAAC,CAAC;YACnD,OAAO,0BAA0B,SAAS,IAAI,SAAS,WAAW,YAAY,IAAI,IAAI,IAAI,QAAQ,IAAI,CAAC;QACzG,CAAC,CAAC,CAAC;QAEH,MAAM,MAAM,GAAG,IAAI,CAAC,SAAS,CAAC;YAC5B,OAAO,EAAE,YAAY;YACrB,SAAS,EAAE;gBACT;oBACE,MAAM,EAAE,OAAO;oBACf,MAAM,EAAE,+BAA+B;oBACvC,QAAQ,EAAE,UAAU;iBACrB;gBACD;oBACE,MAAM,EAAE,OAAO;oBACf,MAAM,EAAE;wBACN,qBAAqB;wBACrB,sBAAsB;wBACtB,mBAAmB;qBACpB;oBACD,QAAQ,EAAE,gBAAgB,SAAS,IAAI,SAAS,IAAI;iBACrD;gBACD;oBACE,MAAM,EAAE,OAAO;oBACf,MAAM,EAAE,2BAA2B;oBACnC,QAAQ,EAAE,GAAG;iBACd;gBACD;oBACE,MAAM,EAAE,OAAO;oBACf,MAAM,EAAE;wBACN,mBAAmB;wBACnB,4BAA4B;qBAC7B;oBACD,QAAQ,EAAE,eAAe,SAAS,IAAI,SAAS,eAAe;iBAC/D;aACF;SACF,CAAC,CAAC;QAEH,IAAI,CAAC;YACH,MAAM,SAAS,CAAC,IAAI,CAAC,IAAI,oBAAoB,CAAC;gBAC5C,QAAQ,EAAE,QAAQ;gBAClB,UAAU,EAAE,iBAAiB;gBAC7B,cAAc,EAAE,MAAM;aACvB,CAAC,CAAC,CAAC;QACN,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,OAAO,CAAC,GAAG,CAAC,sCAAsC,QAAQ,KAAK,GAAG,CAAC,OAAO,EAAE,CAAC,CAAC;QAChF,CAAC;IACH,CAAC;IAED,IAAI,OAAO,GAAG,CAAC,EAAE,CAAC;QAChB,OAAO,CAAC,GAAG,CAAC,WAAW,OAAO,4BAA4B,CAAC,CAAC;IAC9D,CAAC;SAAM,CAAC;QACN,OAAO,CAAC,GAAG,CAAC,8BAA8B,CAAC,CAAC;IAC9C,CAAC;IAED,6DAA6D;IAC7D,MAAM,cAAc,GAAG,MAAM;SAC1B,MAAM,CAAC,CAAC,IAAI,EAAE,EAAE;QACf,MAAM,MAAM,GAAG,eAAe,CAAC,WAAW,EAAE,IAAI,CAAC,CAAC;QAClD,MAAM,gBAAgB,GAAG,MAAM,CAAC,OAAO,IAAI,YAAY,CAAC,KAAK,EAAE,OAAO,IAAI,GAAG,CAAC;QAC9E,OAAO,gBAAgB,IAAI,aAAa,CAAC,kBAAkB,CAAC;IAC9D,CAAC,CAAC;SACD,GAAG,CAAC,CAAC,IAAI,EAAE,EAAE,CAAC,gBAAgB,SAAS,SAAS,aAAa,CAAC,cAAc,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;IAEzF,IAAI,cAAc,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;QAC9B,MAAM,aAAa,CAAC,SAAS,EAAE,SAAS,EAAE,cAAc,EAAE,2BAA2B,CAAC,CAAC;IACzF,CAAC;AACH,CAAC"}
|
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* ECS-specific cloud setup logic.
|
|
3
|
+
*
|
|
4
|
+
* Extracted from cloud-setup.ts to keep the main orchestrator slim.
|
|
5
|
+
* Contains all AWS resource creation/discovery for ECS Fargate setup.
|
|
6
|
+
*/
|
|
7
|
+
import type { CloudConfig } from "../../shared/config.js";
|
|
8
|
+
export declare function setupEcsCloud(cloud: CloudConfig): Promise<boolean>;
|
|
9
|
+
//# sourceMappingURL=cloud-setup-ecs.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"cloud-setup-ecs.d.ts","sourceRoot":"","sources":["../../../src/cli/commands/cloud-setup-ecs.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AAsCH,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,wBAAwB,CAAC;AAM1D,wBAAsB,aAAa,CAAC,KAAK,EAAE,WAAW,GAAG,OAAO,CAAC,OAAO,CAAC,CA2LxE"}
|